Addressing the Risk of Unpatched Virtual Machines

ultimatewindowssecurity
With pass-the-hash and other horizontal kill chain techniques all attackers need is one unpatched system to get started. Then as long as they can find another system – and it doesn't have to be an “important” system – to compromise they can keep moving along the horizontal kill chain until they finally reach pay dirt either in the form of a domain wide privileged account or the information itself that they seek. That's why for the past few years I've been saying you have to do everything right on every system. We've seen over and over again that it only takes one system.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

NSX-T Data Center: how it differs from NSX-V and what you need to know

VMware

This webinar will take you through the main differences between VMware NSX-T Data Center and NSX-V, why you should consider NSX-T Data Center and the difference in processes you’ll need to follow. It will also outline our newly updated Install, Configure, Manage course which aligns to a new certification exam being released soon.
Watch Now

How to Upgrade Your vSphere to the Latest and Greatest

vmware

With vSphere as your foundational hypervisor layer, keeping up to date with the latest versions is essential to ensure the most efficient and secure experience. With vSphere 5.5 end of general support coming up quickly on September 19, 2018, and vSphere 6.5U2 and vSphere 6.7 general availability, you may be wondering which way to go. Attend this technical webcast to understand the benefits of upgrading directly from the vSphere upgrade experts.
Watch Now

Navigating the Complexities of Government Wi-Fi Networks

Between navigating the complexities of government policies and processes, or various agencies and departments, designing networks in the government sector can be challenging. Multiple types of environments — from large campuses, government departments, or secure facilities — all need high-performing Wi-Fi. In addition, you may have a need for robust network security and flexibility — both are needed when you have a large percentage of geographically dispersed workers. This makes understanding and defining your network requirements critical to a successful deployment.
Watch Now

The Tenth International Conference on Cloud Computing, GRIDs, and Virtualization

Iaria

Cloud economics ,Core cloud services, Cloud technologies, Cloud computing, On-demand computing models; Hardware-as-a-service; Software-as-a-service SaaS applications; Platform-as-service; Storage as a service in cloud; Data-as-a-Service; Service-oriented architecture (SOA); Cloud computing programming and application development; Scalability, discovery of services and data in Cloud computing infrastructures; Trust and clouds; Client-cloud computing challenges; Geographical constraints for deploying clouds.
Watch Now

Spotlight

resources